ScaleSec / project_lockdownLinks
GCP Auto Remediation Suite for High Risk Events
☆43Updated 4 years ago
Alternatives and similar repositories for project_lockdown
Users that are interested in project_lockdown are comparing it to the libraries listed below
Sorting:
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Updated this week
- Be notified in the event of a new GCP Organization Policy being released.☆25Updated last year
- Compares and analyzes GCP IAM roles.☆78Updated 10 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 4 years ago
- ☆83Updated 6 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- The SOCless automation framework☆140Updated 11 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 9 months ago
- ☆23Updated 2 years ago
- AWS SSO Reporter☆55Updated 8 months ago
- A Golang program to rotate AWS & GCP account keys☆67Updated 8 months ago
- ☆14Updated 3 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Updated 5 years ago
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- ☆124Updated 8 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Scripts to quickly fix security and compliance issues☆28Updated 2 years ago
- GCP CSPM using Google Sheets☆38Updated 10 months ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Updated last year
- ☆157Updated 2 years ago
- Blazing CloudTrail since 2018☆138Updated 7 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Take automated actions against threats and vulnerabilities.☆216Updated 2 years ago
- Utilities for programmatic analysis of Cartography data.☆40Updated this week
- AWS docs, guides, and other tools☆75Updated 3 years ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆65Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- Tweets when new GCP IAM updates are found☆12Updated last week
- Crowdsourced list of sensitive IAM Actions☆159Updated last year